TAU professor tips off US over security flaw in e-passports

Researcher realized that hackers were able to access passport data from afar.

April 25, 2010 04:50
US E-passports

US E-passports 311. (photo credit: GPO)

A Tel Aviv University researcher has enabled the US State Department to fix security holes in its electronic passports, and now has set his sights on at-risk credit, debit and “smart” cards used by hundreds of millions of people around the world.

E-passports contain biometric data, electronic fingerprints and pictures of the holder, as well as a wireless radio frequency identification (RFID) transmitter. Although the original system was designed to operate at close range, Prof. Avishai Wool of TAU’s Blavatnik School of Computer Sciences realized that hackers were able to access data from afar.

Be the first to know - Join our Facebook page.

Noticing this security problem, Wool helped ensure that the computer chip in American e-passports could be read only when the passports were opened. In 2007, the State Department outfitted every new passport with both a security chip and conductive fibers on the back.

US Embassy spokesman Kurt Hoyer acknowledged to The Jerusalem Post on Thursday that there had “been a problem” in the past with his country’s e-passports, but added that it had been dealt with. He could not say whether the State Department had heard about the difficulty from Wool or whether any damage or security breaches had resulted from the problem.

Now, a new study by Wool has found serious security drawbacks in similar chips that are being embedded in credit, debit and smart cards. The vulnerabilities of this electronic approach – and of the private information contained in the chips – are becoming more acute, he says. Using simple devices constructed from $20 disposable cameras and copper cooking-gas pipes, Wool and his team of students have demonstrated how easily the cards’ radio frequency (RF) signals can be disrupted.

His work will be presented later this month at the IEEE RFID conference in Orlando, Florida.

Wool has suggested some small steps that can be taken to make smart cards smarter, the easiest one being to shield the card with something as simple as aluminium foil to insulate the e-transmission.

Wool’s most recent research centers on the new electronic voting technology being prepared in Israel.

“We show how the Israeli government’s new system based on the RFID chip is a very risky approach for security reasons. It allows hackers who are not much more than amateurs to breach the system,” he explained Thursday. “One way to catch hackers, criminals and terrorists is by thinking like one.”

In his lab, Wool constructed an attack mechanism – an RFID “zapper” – from a disposable camera. Replacing the camera’s bulb with an RFID antenna, he showed how the electromagnetic pulse signal produced by the camera could destroy the data on nearby RFID chips such as e-passports, e-ballots and credit cards.

“In a voting system, this would be the equivalent of burning ballots, but without the fire and smoke,” he said.

In the case of e-voting, a ballot box could be made of conductive materials to overcome the security problem.

The most insidious type of attack is the “relay attack.”

In this scenario, the voting station assumes it is communicating with an RFID ballot near it, but it’s easy for a hacker or terrorist to make equipment that can trick it. Such an attack can be used to transfer votes from party to party and nullify votes for undesired parties, Wool demonstrated.

A relay attack may also be used to allow a terrorist to cross a border using someone else’s e-passport.

As protection in the case of e-voting, a ballot box could be made of conductive materials, he advises.

Another attack involves jamming the radio frequencies that read the card. Though the card’s transmissions are designed to be read by antennas less than a meter away, Wool and his students demonstrated how the transmissions could be jammed by a battery-powered transmitter 20 meters away. This means that an attacker can disable an entire voting station from across the street.

Similarly, a terror group could jam e-passport systems at US border controls relatively easily, he suggested.

“All the new technologies we have now seem really cool. But when anything like this first comes onto the market, it will be fraught with security holes,” the TAU computer expert warned. “In the US, the federal government poured a lot of money into e-voting, only to discover later that the deployed systems were vulnerable. As a result, over the last few years, we’ve seen a trend back toward systems with paper trails.”

The State Department’s Web site on passports at www.travel.state.gov now provides advice to overcome the security problems that Wool has discovered.

“We feel that it would be good to point out what we have done to diminish the known nefarious acts of ‘skimming’ data from the chip, ‘eavesdropping’ on communications between the chip and reader, ‘tracking’ passport holders and ‘cloning’ the passport chip in order to facilitate identity theft crimes,” says the Web site.

“The State Department is using an embedded metallic element in our passports. One of the simplest measures for preventing unauthorized reading of e-passports is to add RF blocking material to the cover of an e-passport. Before such a passport can be read, it has to be physically opened. It is a simple and effective method for reducing the opportunity for unauthorized reading of the passport at times when the holder does not expect it,” the site continues.

It adds that the department has adopted Basic Access Control to minimize the risk of skimming and eavesdropping. This requires that the initial interaction between the embedded microchip in the passport and the border control reader include protocols for setting up the secure communication channel. To ensure that only authorized RFID readers can read data, Basic Access Control stores a pair of secret cryptographic codes in the passport chip.

When a reader attempts to scan the passport, it engages in a challenge-response protocol, asking questions to ensure that the person is authorized to access the data. If authentication is successful, the passport releases its data contents; otherwise, the reader is deemed unauthorized, and the passport refuses read access.

Related Content

March 23, 2018
Gunman shot dead after three killed in French shooting, supermarket attack


Israel Weather
  • 16 - 23
    Beer Sheva
    20 - 21
    Tel Aviv - Yafo
  • 18 - 18
    18 - 20
  • 25 - 32
    20 - 23